Audiobook10 hours
Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
Written by Bart R. McDonough
Narrated by Kyle Tait
Rating: 4 out of 5 stars
4/5
()
About this audiobook
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.
In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person, so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from:
- Identify theft
- Compromising your children
- Lost money
- Lost access to email and social media accounts
In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person, so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from:
- Identify theft
- Compromising your children
- Lost money
- Lost access to email and social media accounts
Related to Cyber Smart
Related audiobooks
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Ethical Hacking Rating: 0 out of 5 stars0 ratingsHACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Cybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratingsHACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 4 out of 5 stars4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsCybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsRansomware Protection Playbook Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsThe Smartest Person in the Room Rating: 5 out of 5 stars5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsThe Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5
Internet & Web For You
30 Passive Income Ideas Rating: 4 out of 5 stars4/5How to Be Fine: What We Learned by Living by the Rules of 50 Self-Help Books Rating: 4 out of 5 stars4/5The YouTube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Web3: Charting the Internet's Next Economic and Cultural Frontier Rating: 0 out of 5 stars0 ratingsDarknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5SEO 2021: Learn search engine optimization with smart internet marketing strategies Rating: 5 out of 5 stars5/5AWS: The Complete Beginner to Advanced Guide for Amazon Web Service — The Ultimate Tutorial Rating: 5 out of 5 stars5/5Ten Arguments for Deleting Your Social Media Accounts Right Now Rating: 4 out of 5 stars4/5The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5How to Start a Podcast: An Essential Guide to Profitable Podcasting for Beginners Rating: 5 out of 5 stars5/5Invisibility Toolkit Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Blog, Inc.: Blogging for Passion, Profit, and to Create Community Rating: 4 out of 5 stars4/5How Design Makes The World Rating: 5 out of 5 stars5/5AWS: The Most Complete Guide to Amazon Web Services from Beginner to Advanced Level Rating: 3 out of 5 stars3/5Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Podcast: The Ultimate Guide To Podcasting Rating: 5 out of 5 stars5/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsEverybody Has a Podcast (Except You): A How-To Guide from the First Family of Podcasting Rating: 5 out of 5 stars5/5A Body to Love: Cultivate Community, Body Positivity, and Self-Love in the Age of Social Media Rating: 4 out of 5 stars4/5Platform: Get Noticed in a Noisy World Rating: 4 out of 5 stars4/5Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers Rating: 5 out of 5 stars5/5
Reviews for Cyber Smart
Rating: 4.166666666666667 out of 5 stars
4/5
6 ratings1 review
- Rating: 5 out of 5 stars5/5Every week seems to bring news of another data security breach, affecting millions of people. By now, it seems like everyone in America has been victim of at least one such security breach. What can be done to slow down, or stop, the cyber criminals?Get a copy of your credit report from all three credit agencies. Get a copy of your child's report, too (a popular target for criminals). Put a credit freeze on these reports; that way, no one can open a new credit card account. Get a copy of your medical records, and make sure that, for instance, no one has given you AIDS when you don't actually have it, or deleted your allergy to penicillin.Use a password management program, or write down your passwords and keep that list somewhere safe, like in a locked safe. It is tempting to recycle a strong password among several sites. It is also a really bad idea; once that strong password is cracked, several sites have just been opened. To create a password, put together a couple of words like "willow" and "september". Add in a couple of numbers and special characters. Delete and/or capitalize a couple of letters.Use nonsense answers to security questions. (What is you mother's maiden name? Chocolate bunny.) Use two-factor authentication; the book explains just what it is. If your bank or the IRS has a legitimate problem with you, they will send a letter. They will not send an email that says Please Click Here. They will also not call you with an attitude of "Pay up now, or you're going to jail!"For some people, this book is nothing more than common knowledge. For everyone else, the tips in this book cannot be repeated often enough. This book is very easy to read, and is very much recommended.